Inpainting forgery detection using hybrid generative/discriminative approach based on bounded generalized Gaussian mixture model
暂无分享,去创建一个
Sami Bourouis | Nizar Bouguila | Wajdi Alhakami | Abdullah Alharbi | Fatma Najar | N. Bouguila | S. Bourouis | Wajdi Alhakami | A. Alharbi | Fatma Najar
[1] Sami Bourouis,et al. Bayesian learning of finite generalized inverted Dirichlet mixtures: Application to object classification and forgery detection , 2014, Expert Syst. Appl..
[2] Anderson Rocha,et al. Going deeper into copy-move forgery detection: Exploring image telltales via multi-scale analysis and voting processes , 2015, J. Vis. Commun. Image Represent..
[3] Hui Zhang,et al. Bounded generalized Gaussian mixture model , 2014, Pattern Recognit..
[4] Ahmad Mahmoudi Aznaveh,et al. Iterative Copy-Move Forgery Detection Based on a New Interest Point Detector , 2016, IEEE Transactions on Information Forensics and Security.
[5] Alberto Del Bimbo,et al. Ieee Transactions on Information Forensics and Security 1 a Sift-based Forensic Method for Copy-move Attack Detection and Transformation Recovery , 2022 .
[6] Xingming Sun,et al. A passive authentication scheme for copy-move forgery based on package clustering algorithm , 2016, Multimedia Tools and Applications.
[7] Sami Bourouis,et al. Spatially Constrained Mixture Model with Feature Selection for Image and Video Segmentation , 2018, ICISP.
[8] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[9] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[10] Vladimir Vapnik,et al. Statistical learning theory , 1998 .
[11] Haizhou Li,et al. GMM-SVM Kernel With a Bhattacharyya-Based Distance for Speaker Recognition , 2010, IEEE Transactions on Audio, Speech, and Language Processing.
[12] Fatma Najar,et al. Unsupervised Human Action Categorization Using a Riemannian Averaged Fixed-Point Learning of Multivariate GGMM , 2018, ICIAR.
[13] Sami Bourouis,et al. Intrusion detection alert management for high-speed networks: current researches and applications , 2015, Secur. Commun. Networks.
[14] Hamed Vahdat-Nejad,et al. Towards a Better Understanding of Ubiquitous Cloud Computing , 2018, Int. J. Cloud Appl. Comput..
[15] Sami Bourouis,et al. Color image segmentation with bounded generalized Gaussian mixture model and feature selection , 2018, 2018 4th International Conference on Advanced Technologies for Signal and Image Processing (ATSIP).
[16] David Haussler,et al. Exploiting Generative Models in Discriminative Classifiers , 1998, NIPS.
[17] Guillermo Sapiro,et al. Image inpainting , 2000, SIGGRAPH.
[18] Luc Van Gool,et al. Speeded-Up Robust Features (SURF) , 2008, Comput. Vis. Image Underst..
[19] Nizar Bouguila,et al. Finite Generalized Gaussian Mixture Modeling and Applications to Image and Video Foreground Segmentation , 2007, Fourth Canadian Conference on Computer and Robot Vision (CRV '07).
[20] Faisal R. Al-Osaimi,et al. Bayesian inference by reversible jump MCMC for clustering based on finite generalized inverted Dirichlet mixtures , 2019, Soft Comput..
[21] Davide Cozzolino,et al. Efficient Dense-Field Copy–Move Forgery Detection , 2015, IEEE Transactions on Information Forensics and Security.
[22] Radford M. Neal. Pattern Recognition and Machine Learning , 2007, Technometrics.
[23] Xingming Sun,et al. Segmentation-Based Image Copy-Move Forgery Detection Scheme , 2015, IEEE Transactions on Information Forensics and Security.
[24] Shankar M. Krishnan,et al. Image segmentation using finite mixtures and spatial information , 2004, Image Vis. Comput..
[25] Hany Farid,et al. Exposing digital forgeries by detecting traces of resampling , 2005, IEEE Transactions on Signal Processing.
[26] Vikas Maheshkar,et al. An integrated method of copy-move and splicing for image forgery detection , 2018, Multimedia Tools and Applications.
[27] Antoni B. Chan,et al. A Family of Probabilistic Kernels Based on Information Divergence , 2004 .
[28] Yuan Yan Tang,et al. SIFT Keypoint Removal and Injection via Convex Relaxation , 2016, IEEE Transactions on Information Forensics and Security.
[29] Hany Farid,et al. Exposing Digital Forgeries in Complex Lighting Environments , 2007, IEEE Transactions on Information Forensics and Security.
[30] Heung-Kyu Lee,et al. Detection of Copy-Rotate-Move Forgery Using Zernike Moments , 2010, Information Hiding.
[31] Christian Riess,et al. Ieee Transactions on Information Forensics and Security an Evaluation of Popular Copy-move Forgery Detection Approaches , 2022 .
[32] Chi-Man Pun,et al. Image Forgery Detection Using Adaptive Oversegmentation and Feature Point Matching , 2015, IEEE Transactions on Information Forensics and Security.
[33] P. Deb. Finite Mixture Models , 2008 .
[34] Firas AlBalas,et al. An Online Intrusion Detection System to Cloud Computing Based on Neucube Algorithms , 2018, Int. J. Cloud Appl. Comput..
[35] Alexander Wong,et al. A nonlocal-means approach to exemplar-based inpainting , 2008, 2008 15th IEEE International Conference on Image Processing.
[36] Fatma Najar,et al. A Fixed-Point Estimation Algorithm for Learning the Multivariate GGMM: Application to Human Action Recognition , 2018, 2018 IEEE Canadian Conference on Electrical & Computer Engineering (CCECE).
[37] Qiuqi Ruan,et al. Object Removal By Cross Isophotes Exemplar-based Inpainting , 2006, 18th International Conference on Pattern Recognition (ICPR'06).
[38] Chun-Shien Lu,et al. Structural digital signature for image authentication: an incidental distortion resistant scheme , 2000, MULTIMEDIA '00.
[39] Miroslav Goljan,et al. Digital camera identification from sensor pattern noise , 2006, IEEE Transactions on Information Forensics and Security.
[40] Jessica Fridrich,et al. Detection of Copy-Move Forgery in Digital Images , 2004 .
[41] Nizar Bouguila,et al. Deriving kernels from generalized Dirichlet mixture models and applications , 2013, Inf. Process. Manag..
[42] Vijay H. Mankar,et al. Digital image forgery detection using passive techniques: A survey , 2013, Digit. Investig..
[43] Xunyu Pan,et al. Region Duplication Detection Using Image Feature Matching , 2010, IEEE Transactions on Information Forensics and Security.
[44] SallayHassen,et al. Intrusion detection alert management for high-speed networks , 2015 .
[45] Patrick Pérez,et al. Region filling and object removal by exemplar-based image inpainting , 2004, IEEE Transactions on Image Processing.
[46] Qiong Wu,et al. A Sorted Neighborhood Approach for Detecting Duplicated Regions in Image Forgeries Based on DWT and SVD , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[47] Sami Bourouis,et al. A Flexible Statistical Model for Image Denoising , 2018, ICIAR.
[48] R. Kondor,et al. Bhattacharyya and Expected Likelihood Kernels , 2003 .
[49] RochaAnderson,et al. Going deeper into copy-move forgery detection , 2015 .
[50] Nuno Vasconcelos,et al. A Kullback-Leibler Divergence Based Kernel for SVM Classification in Multimedia Applications , 2003, NIPS.